Protection under provision of mobility between mbms servers

FIELD: information technology.

SUBSTANCE: in the method, the user terminating device activates new streaming server to generate new security keys set individually for the user. The said activation includes starting the boot process of the overall boot architecture for the said new streaming server, reception in the user terminating device from the said new streaming server of a new security key, set individually for the new streaming server; generationn in the user terminating device of individually set user security keys said for the said new streaming server and use by the new user terminating device of the new individually set user security keys generated in the user terminating device, with the new streaming server for previously installed streaming service.

EFFECT: ensuring generation of new security keys.

45 cl, 6 dwg

 



 

Same patents:

FIELD: physics.

SUBSTANCE: loop filter 6 includes a region classification unit 12 for extracting an estimate value of each of the regions which make up a local decoded image in order to classify each of the regions into a class belonging to the region, according to the estimate value, and a unit 13 for forming and processing a filter for each class belonging to one or more regions from the regions which make up the local decoded image, forming a Wiener filter which minimises the error arising between the input image and the local decoded image in each of the one or more regions belonging to a class, in order to compensate for the distortion on the one or more regions using the Wiener filter.

EFFECT: high image quality.

3 cl, 18 dwg

FIELD: physics, video.

SUBSTANCE: invention relates to controlling filtering and particularly to controlling deblocking filtering on block boundaries in a video frame. A block-specific filter decision value is calculated for a pixel block in a video frame. If the block-specific filter decision value is below a block-specific threshold, each line or column in the block is individually processed in order to select between a strong and a weak deblocking filter. A respective line-specific filter decision value is thereby calculated for each row or column in the block and compared to a line-specific threshold. If the line-specific filter decision value calculated for a row or column is below the line-specific threshold a strong deblocking filter is selected for the row or column, otherwise a weak deblocking filter is instead selected to combat any blocking artefacts.

EFFECT: high efficiency of deblocking filtering by eliminating or reducing blocking artfacts.

11 cl, 11 dwg

FIELD: radio engineering, communication.

SUBSTANCE: device contains a receiver receiving and syntactically analyzing a bit flow of a coded image; a processor forming a coding unit which is included into a maximum coding block which has hierarchical structure by means of use of the information which indicates this hierarchical structure, syntactically analyzed from the accepted bit flow and forms one sub-block for prediction of a coding block from the coding block, by means of use of information on blocks of a prediction of the named coding block, an image recovery decoder.

EFFECT: higher efficiency of decoding of high-resolution images by determining the depth of the coding unit and the operating mode of the encoding tool according to data characteristics of the image.

5 cl, 8 tbl, 23 dwg

FIELD: information technology.

SUBSTANCE: in the method, after using a modified LBP technique, calculation of LBP code values and search for equivalent LBP code values are performed in rank and domain regions, formed by the same number of pixels located on a circle, where the radius of the circle of the domain region is greater than the radius of the circle of the rank region; the number of pixels, the radius of the circle and the coordinates of the position of the centre pixel for the rank and domain regions are stored.

EFFECT: faster encoding through selection of image characteristics which describe the domain and rank regions.

4 dwg

FIELD: physics.

SUBSTANCE: adaptation is performed by rearranging fragments of discrete cosine transform (DCT) coefficients obtained after two-dimensional DCT on the time axis and subsequent one-dimensional DCT such that the total number of non-zero transform coefficients after three-dimensional DCT is less than the number of non-zero DCT coefficients obtained after three-dimensional DCT without rearranging two-dimensional DCT fragments. In the disclosed method, after forming a domain measuring n×n×n pixels, DCT coefficients are calculated on spatial coordinates x and y for each fragment of the domain. The fragments are then rearranged in the form of a rearrangement vector and a time DCT operation is performed. The DCT coefficients are sampled, encoded and transmitted over a communication channel with the rearrangement vector. At reception, said procedures are performed in reverse order and the original video stream is restored.

EFFECT: high degree of compression of video data with a given image reconstruction error at reception owing to adaptation to variation of static properties of images.

3 cl, 9 dwg

FIELD: information technologies.

SUBSTANCE: method of coding of video data is offered which comprises the obtaining from the coded stream of bits of one or more units of network abstraction level (NAL) for each component of view from a set of components of view of the coded video data where each component of view from the set of components of view corresponds to the common temporary location and where one or more NAL units encapsulate at least a part of the coded video data for the respective components of view and comprise an information specifying the sequence of decoding of the respective components of view. The method also comprises the received information separate from NAL units specifying the relations between the view identifiers for these views and sequence of decoding of components of view. One or more NAL units also comprise the information specifying, whether the first view component of the first view as the reference for prediction between the views of the second component of view for the second different view is used.

EFFECT: coding efficiency improvement.

68 cl, 18 tbl, 12 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to computer engineering. A method of coding video data comprises maintaining a plurality of context models for entropy coding transform coefficients of the video data, wherein the plurality of context models includes one or more context models that are each used for a different transform unit size and at least one joint context model used for two or more transform unit sizes; selecting the joint context model shared by a first transform unit and a second transform unit; selecting contexts for the transform coefficients associated with one of the first transform unit or the second transform unit according to the joint context model; and entropy coding the transform coefficients of said one of the transform units using context adaptive binary arithmetic coding (CABAC) based on the selected contexts.

EFFECT: reduced amount of memory needed to store contexts and probabilities on video coders and decoders.

34 cl, 9 dwg

FIELD: physics, video.

SUBSTANCE: invention relates to image processing means. The method includes creating a plurality of frames of a picture and related prediction reference frames; for each frame and related prediction reference frame, calculating the intensity value and the colour value in a first colour domain; for each frame and related prediction reference frame, calculating weighted prediction gains; if said gains are non-negative, determining that a global transition with zero offset is occurs in a second colour domain; and if not all of said gains are non-negative, determining that a global transition with gradual change in illumination does not occur.

EFFECT: high efficiency of an image display means when encoding and processing video.

28 cl, 16 dwg

FIELD: physics, video.

SUBSTANCE: invention relates to the field of digital signal processing and, in particular, to the field of video signal compression using the movement compensation. The coding method includes the obtaining of target number of movement information predictors to be used for the coded image section and generation of the set of movement information predictors using the obtained target quantity. The set is generated by means of: obtaining of the first set of movement information predictors, each of which is connected with the image section having the pre-set spatial and/or time ratio with the coded image section; modifications of the first set of movement information predictors by removal of the duplicated movement information predictors for obtaining of the reduced set of movement information predictors containing the first number of movement information predictors, and each movement information predictor from the reduced set differs from any other movement information predictor from the reduced set; comparisons of the first number of movement information predictors with the target quantity obtained, and if the first quantity is less than the target quantity, obtaining of the additional movement information predictor and its addition to the reduced set of movement information predictors.

EFFECT: decrease of spatial and time redundancies in video flows.

26 cl, 8 dwg

FIELD: physics, video.

SUBSTANCE: invention relates to a broadcasting system for transmitting a digital television program, particularly a transmission device and a transmission method, in which content which meets needs can be acquired. A server generates a script PDI-S for obtaining a user side PDI-A representative of an answer of a user to a question about user preferences; generates launch information for executing the PDI-A; and transmits the launch information and PDI-S in response to the delivery of broadcast content, and transmits to the client in response to the delivery of reference content a provider side PDI-A representative of an answer set by a provider to the question. The client executes the PDI-S based on detection of launch information and carries out matching between the user side PDI-A and the provider side PDI-A to determine acquisition of reference content delivered by the server.

EFFECT: facilitating delivery of content to a client which satisfies the needs thereof at that time.

10 cl, 48 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to security context signalling. A method for establishing a first security context between a remote station and a serving network, the first security context having a security property that is not supported by a second security context, the method comprising: the remote station forwarding a first message to the serving network, wherein the first message includes an information element; the remote station generating an integrity session key and an encryption session key in accordance with the first security context; the remote station receiving a second message having a message authentication code indicating that the serving network supports the first security context; the remote station verifying the message authentication code using the integrity session key; and the remote station, in response to successful verification of the message authentication code, performs wireless communication protected by the encryption session key.

EFFECT: providing signalling on support of an improved security context.

31 cl, 8 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to multimedia content protection. A method of protecting content (6) scrambled using a content key CW transmitted encrypted by a content access key K, characterised by that said content is transmitted by a transmission system to at least one receiving terminal (4) using a service, provided locally in said receiving terminal using a set of properties Pi, i ranges from 1 to n, known for the transmission system, where each of said properties Pi is represented by a data element xi recorded in said data transmission system, and using a local data element yi with local access, intended only for reading in said terminal, and during transmission, said method comprises a step of super-encrypting said content key CW using at least one invertible super-encryption function fi(xi), which depends on at least one of the properties Pi, i ranges from 1 to n, and upon reception, the value of said super-encrypted content key CW is disclosed by applying to said super-encrypted content key CW an inverse super-encryption function fi1(yi) corresponding to the property Pi.

EFFECT: efficient protection of multimedia content from illegal redistribution.

9 cl, 3 dwg

FIELD: information technology.

SUBSTANCE: method includes steps of: a transmitter using an operating key and an encryption algorithm executable code in a virtual mother card to encrypt a control word CWt to obtain a cryptogram CWt*, using a syntax constructor executable code in the virtual mother card to generate an ECM (Entitlement Control Message) that incorporates the cryptogram CWt*, and transmitting said ECM to a terminal; the terminal receiving the ECM, determining the location of the cryptogram CWt* in the received ECM using syntax analyser executable code and then decrypting the cryptogram CWt* using the operating key and the encryption algorithm.

EFFECT: safer data transmission.

14 cl, 6 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to a broadcast encryption method. The technical result is achieved through a method of controlling decoders of at least one group of decoders, having access to audiovisual data, wherein the method comprises the following steps: at a step when the decoder should become a member of a group: obtaining and storing keys relating to a certain position in the group according to the broadcast encryption scheme; obtaining and storing current group access data containing at least the current group access key which is common for said group at the step of accessing the audiovisual data: using the current group access data for direct or indirect access to audiovisual data, at the step of updating the current group access key: transmitting a first group message containing at least the next group access data containing at least the next group access key encrypted such that only uncancelled decoders can gain access thereto, wherein said group message is further encrypted by the current group access key (CGK); updating the current group access key using the next group access key.

EFFECT: high efficiency of controlling access to broadcast content for a large number of subscribers by controlling access only based on keys.

5 cl, 4 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to computer engineering. The invention can be implemented in a conditional access content broadcast system where it is desirable to identify and take measures against receiving equipment, applied when sharing control words. Owing to the requirement that receiving equipment used in the system transmits to a transmission station a conditional access content message at a precisely defined time, the invention provides a method through which a server identifies receiving equipment participating in the sharing of control words and prevents said receiver from further accessing said content.

EFFECT: effective protection of transmitted content.

12 cl, 2 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to cryptography. A chipset function activation method includes: receiving at least one of the following elements: a segmentation key, a general purpose key and a global cryptographic algorithm selector; transmitting at least two of the following elements: an initial value, the obtained segmentation key, the general purpose key and the global cryptographic algorithm selector to a computation module, wherein the initial value, the obtained segmentation key, the general purpose key and the global cryptographic algorithm selector are provided by at least two different organisations; generating in the computation module a temporary key using one of the following elements: at least one cryptographic algorithm of the computation module and at least two elements selected from a group including the initial value, the segmentation key, the general purpose key and the global cryptographic algorithm selector; receiving an activation message using the computation module; receiving an authentication code of said message using the computation module, wherein said message authentication code is calculated using the temporary key; authenticating said received message using the message authentication code and the temporary key; if the received message is authentic, activating the corresponding chipset function; if the received message is not authentic, prohibiting activation of said corresponding chipset function.

EFFECT: effective chipset protection.

11 cl, 1 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to information decryption methods. The method comprises steps of, in response to the absence in any of the terminals of one or more control words CWc for decrypting one or more multimedia content cryptoperiods, transmitting through said terminal to a control word server a request containing a cryptogram(s) of said one or more absent control words, and in response, transmitting by the control word server to said terminal said one or more absent control words, wherein the control word server selectively determines for each terminal the number of additional control words CWs intended for transmission to the terminal depending on the probability of compromising the protection of said additional control words, and besides the absent control words CWc, transmitting to said terminal said determined number of additional control words CWs, which enables the terminal to decrypt additional multimedia content cryptoperiods in addition to cryptoperiods decrypted using the requested absent control words CWc.

EFFECT: ensuring secure transmission of control words.

10 cl, 6 dwg

FIELD: radio engineering, communication.

SUBSTANCE: apparatus comprises: a unit which stores a key used for encrypting or decrypting data; a unit which receives a key transmission request including a key-dividing number via a wireless signal from an operation terminal; a unit which acquires a key transmission request from the wireless signal received by the reception section; a unit which determines a security level when transmitting the key to the operation terminal, as a transmission security level; a unit which determines a transmission power in accordance with the transmission security level determined by the security level determination unit and the key-dividing number included in the key transmission request acquired by the key transmission request acquisition unit; a unit which acquires each key fragment by dividing the key stored in the storage unit into the key-dividing number; and a unit which transmits the each key fragment acquired by the key acquisition unit using the transmission power determined by the transmission power determination unit, via a wireless signal to the operation terminal.

EFFECT: safer data transmission.

15 cl, 9 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to a network operation method. A network comprises a node and a system control device. A system control device comprises a root key material which is a set of functions, each having a degree of complexity α, and a node is provided with a portion of key material of a node having a degree of complexity α extracted from the root key material. The system control device generates a portion of key material for an external user with a degree of complexity α from the root key material and generates an access identifier. The system control device generates access key material with a degree of complexity less than α from the portion of key material for the external user and generates a node identifier. The system control device provides the external user with a portion of access key material and the node identifier. The external user extracts a key from the portion of access key material and sends to the node said key and access identifier. The node calculates a key from the access identifier and the portion of node key material and compares the key sent by the external user and the key calculated by the node in order to identify the external user.

EFFECT: improved security.

14 cl, 4 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to methods of providing secure communication in a network. The method comprises: an administration device provided with root keying materials, and steps of: generating, by the administration device based on the root keying materials, parts of keying material of a first node containing a certain number of sub-elements, and parts of keying material of the first node, assembled for generating a first terminated key, the administration device selects a subset of sub-elements of the first parts of the keying material, wherein the number of selected sub-elements is less than or equal to the total number of sub-elements of the first parts of the keying material, and the selected sub-elements form partial parts of the keying material of the first node or a symmetrical key generation mechanism, the first node generates, based on the symmetrical key generation mechanism of the first node and on a second node identifier, a first key used to provide secure communication with a second node.

EFFECT: more secure data transmission in a network.

6 cl, 7 dwg

FIELD: communication systems.

SUBSTANCE: system has receiver, transmitter, processing element, connected to receiver and transmitter and controlling receiver and transmitter, digital rights module, connected to processing elements and controlling operation of communication device in digital rights environment on domain basis, while digital rights module of communication device together with dispenser of domains of digital rights environment on domain basis is made with possible selective addition of communication device to domain, owning one or several communication devices, which together use a cryptographic key.

EFFECT: possible selective retrieval and decoding of digital content on basis of membership in a domain.

10 cl, 11 dwg

Up!